咨询与建议

限定检索结果

文献类型

  • 1,549 篇 期刊文献
  • 1,339 篇 会议
  • 1 册 图书

馆藏范围

  • 2,889 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,953 篇 工学
    • 1,359 篇 计算机科学与技术...
    • 1,141 篇 软件工程
    • 459 篇 信息与通信工程
    • 219 篇 生物工程
    • 212 篇 电气工程
    • 211 篇 控制科学与工程
    • 173 篇 电子科学与技术(可...
    • 140 篇 光学工程
    • 106 篇 生物医学工程(可授...
    • 104 篇 机械工程
    • 102 篇 化学工程与技术
    • 84 篇 网络空间安全
    • 77 篇 仪器科学与技术
    • 56 篇 交通运输工程
    • 55 篇 安全科学与工程
    • 52 篇 动力工程及工程热...
    • 47 篇 材料科学与工程(可...
    • 46 篇 土木工程
  • 1,024 篇 理学
    • 500 篇 数学
    • 276 篇 物理学
    • 257 篇 生物学
    • 173 篇 统计学(可授理学、...
    • 94 篇 化学
    • 75 篇 系统科学
  • 519 篇 管理学
    • 278 篇 图书情报与档案管...
    • 251 篇 管理科学与工程(可...
    • 93 篇 工商管理
  • 107 篇 医学
    • 88 篇 临床医学
    • 64 篇 基础医学(可授医学...
  • 87 篇 法学
    • 64 篇 社会学
  • 43 篇 经济学
  • 33 篇 农学
  • 18 篇 教育学
  • 15 篇 军事学
  • 10 篇 文学
  • 3 篇 艺术学

主题

  • 114 篇 semantics
  • 80 篇 feature extracti...
  • 70 篇 deep learning
  • 66 篇 training
  • 64 篇 accuracy
  • 50 篇 federated learni...
  • 47 篇 computational mo...
  • 40 篇 machine learning
  • 36 篇 data mining
  • 36 篇 graph neural net...
  • 34 篇 image segmentati...
  • 34 篇 privacy
  • 33 篇 object detection
  • 32 篇 optimization
  • 30 篇 data models
  • 30 篇 adaptation model...
  • 29 篇 reinforcement le...
  • 28 篇 forecasting
  • 27 篇 neural networks
  • 26 篇 knowledge graph

机构

  • 170 篇 university of ch...
  • 81 篇 cas key lab of n...
  • 74 篇 key laboratory o...
  • 71 篇 shandong provinc...
  • 64 篇 cas key laborato...
  • 52 篇 shandong enginee...
  • 50 篇 network and data...
  • 48 篇 college of compu...
  • 46 篇 school of comput...
  • 45 篇 tianjin key labo...
  • 36 篇 zhejiang lab
  • 35 篇 college of cyber...
  • 34 篇 school of comput...
  • 33 篇 school of cyber ...
  • 31 篇 school of comput...
  • 28 篇 hubei key labora...
  • 28 篇 key lab of infor...
  • 28 篇 national enginee...
  • 28 篇 peng cheng labor...
  • 26 篇 hubei engineerin...

作者

  • 191 篇 cheng xueqi
  • 149 篇 guo jiafeng
  • 48 篇 zhang ruqing
  • 47 篇 fan yixing
  • 44 篇 lan yanyan
  • 43 篇 shen huawei
  • 36 篇 jin xiaolong
  • 31 篇 liu jun
  • 29 篇 pang liang
  • 26 篇 jin hai
  • 25 篇 meng deyu
  • 24 篇 bi keping
  • 22 篇 chen enhong
  • 21 篇 de rijke maarten
  • 21 篇 liu qi
  • 21 篇 wang zhongmin
  • 20 篇 xueqi cheng
  • 20 篇 xu jun
  • 20 篇 li zixuan
  • 19 篇 hu shengshan

语言

  • 2,273 篇 英文
  • 576 篇 其他
  • 43 篇 中文
检索条件"机构=Key Lab of Network Data Science and Technology"
2889 条 记 录,以下是571-580 订阅
排序:
Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0
收藏 引用
science China(Information sciences) 2022年 第1期65卷 192-206页
作者: Chenyu WANG Ding WANG Guoai XU Debiao HE School of Cyber Security Beijing University of Posts and Telecommunications State Key Laboratory of Cryptology College of Cyber Science Nankai University Tianjin Key Laboratory of Network and Data Security Technology Nankai University School of Cyber Science and Engineering Wuhan University
Industry 4.0, which combines information technology, network and industrial production, is expected to have a tremendous impact on our daily lives. In such a complex and security-critical system with resource-constrai... 详细信息
来源: 评论
A Client Selection Method Based on Loss Function Optimization for Federated Learning
收藏 引用
Computer Modeling in Engineering & sciences 2023年 第10期137卷 1047-1064页
作者: Yan Zeng Siyuan Teng Tian Xiang Jilin Zhang Yuankai Mu Yongjian Ren Jian Wan School of Computer Science and Technology Hangzhou Dianzi UniversityHangzhou310018China Key Laboratory of Complex System Modeling and Simulation Ministry of EducationHangzhou310018China Zhejiang Engineering Research Center of Data Security Governance Hangzhou310018China Intelligent Robotics Research Center Zhejiang LabHangzhou311100China HDU-ITMO Joint Institute Hangzhou Dianzi UniversityHangzhou310018China
Federated learning is a distributedmachine learningmethod that can solve the increasingly serious problemof data islands and user data privacy,as it allows training data to be kept locally and not shared with other **... 详细信息
来源: 评论
Secure YOLOv3-SPP: Edge-Cooperative Privacy-preserving Object Detection for Connected Autonomous Vehicles
Secure YOLOv3-SPP: Edge-Cooperative Privacy-preserving Objec...
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Zhou, Yongjie Xiong, Jinbo Bi, Renwan Tian, Youliang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China Fujian Provincial Key Laboratory of Network System Information Security College of Computer and Cyberspace Security Fujian Normal University FJ Fuzhou350117 China
The connected autonomous vehicles (CAVs) are a key component of intelligent transportation systems (ITS) where vehicles communicate with each other to exchange sensing data from on-board sensors (e.g., high-definition... 详细信息
来源: 评论
Design and Implementation of Cyber Space Threat Detection System Based on User Behavioral Logs
Design and Implementation of Cyber Space Threat Detection Sy...
收藏 引用
Electronic Information Engineering and Computer Communication (EIECC), International Conference on
作者: Wenhao Wang Hao Li Peng Nie Tianjin Key Laboratory of Network and Data Security Technology College of Cyber Science Nankai University Tianjin China Science and Technology on Communication Networks Laboratory Shijiazhuang China College of Cyber Science Nankai University Tianjin China
In contemporary society, the role of networks in daily work and business activities is increasingly prominent. The enterprise intranet, serving as a crucial bridge for maintaining work stability, asset security, and b...
来源: 评论
Backdoor Defense via Deconfounded Representation Learning
Backdoor Defense via Deconfounded Representation Learning
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Zaixi Zhang Qi Liu Zhicai Wang Zepu Lu Qingyong Hu Anhui Province Key Lab of Big Data Analysis and Application School of Computer Science and Technology University of Science and Technology of China State Key Laboratory of Cognitive Intelligence Hefei Anhui China University of Science and Technology of China Hong Kong University of Science and Technology
Deep neural networks (DNNs) are recently shown to be vulnerable to backdoor attacks, where attackers embed hidden backdoors in the DNN model by injecting a few poisoned examples into the training dataset. While extens...
来源: 评论
Vertex-Critical (P5, chair)-Free Graphs
arXiv
收藏 引用
arXiv 2023年
作者: Huang, Shenwei Li, Zeyu College of Computer Science Nankai University Tianjin300350 China Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300071 China
Given two graphs H1 and H2, a graph G is (H1, H2)-free if it contains no induced subgraph isomorphic to H1 or H2. A Pt is the path on t vertices. A chair is a P4 with an additional vertex adjacent to one of the middle... 详细信息
来源: 评论
ATEDU-NET: An Attention-Embedded Deep Unet for multi-disease diagnosis in chest X-ray images, breast ultrasound, and retina fundus
收藏 引用
Computers in Biology and Medicine 2025年 186卷 109708-109708页
作者: Ejiyi, Chukwuebuka Joseph Qin, Zhen Agbesi, Victor K. Ejiyi, Makuachukwu Bennedith Chikwendu, Ijeoma A. Bamisile, Oluwatoyosi F. Onyekwere, Favour Ezinne Bamisile, Olusola O. College of Nuclear Technology and Automation Engineering Chengdu University of Technology Sichuan 610059 China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Sichuan Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Pharmacy Department University of Nigeria Nsukka Enugu State Nsukka Nigeria School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China
In image segmentation for medical image analysis, effective upsampling is crucial for recovering spatial information lost during downsampling. This challenge becomes more pronounced when dealing with diverse medical i... 详细信息
来源: 评论
Advancing cancer diagnosis and prognostication through deep learning mastery in breast, colon, and lung histopathology with ResoMergeNet
收藏 引用
Computers in Biology and Medicine 2025年 185卷 109494-109494页
作者: Ejiyi, Chukwuebuka Joseph Qin, Zhen Agbesi, Victor K. Yi, Ding Atwereboannah, Abena A. Chikwendu, Ijeoma A. Bamisile, Oluwatoyosi F. Bakanina Kissanga, Grace-Mercure Bamisile, Olusola O. College of Nuclear Technology and Automation Engineering & Sichuan Industrial Internet Intelligent Monitoring and Application Engineering Research Center Chengdu University of Technology Sichuan Chengdu China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Sichuan Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China School of Life Science University of Electronic Science and Technology of China Chengdu China
Cancer, a global health threat, demands effective diagnostic solutions to combat its impact on public health, particularly for breast, colon, and lung cancers. Early and accurate diagnosis is essential for successful ... 详细信息
来源: 评论
A Lightweight Collaborative Target Recognition Method for Unmanned Aerial Vehicle Cluster
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Cao, Mingsheng Yin, Yiyang Zhang, Li Li, Weizhuang Liu, Ziqiang Zhu, Ruizheng Zhao, Yang University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province School of Information and Software Engineering Chengdu611731 China University of Electronic Science and Technology of China ChengDu Research Institute Chengdu610054 China Nanjing University of Aeronautics and Astronautics School of Aerospace Engineering Nanjing210001 China
This paper aims to explore a reliable target recognition technique for unmanned aerial vehicle (UAV) clusters, and proposes a lightweight collaborative target recognition methods based on multiple viewpoints. In the p... 详细信息
来源: 评论
Computer aided diagnosis of diabetic retinopathy based on multi-view joint learning
收藏 引用
Computers in Biology and Medicine 2024年 174卷 108428-108428页
作者: Xu, Xuebin Liu, Dehua Huang, Guohua Wang, Muyu Lei, Meng Jia, Yang School of Computer Science and Technology Xi'an University of Posts and Telecommunications Shaanxi Xi'an710121 China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Shaanxi Xi'an710121 China Xi'an Key Laboratory of Big Data and Intelligent Computing Shaanxi Xi'an710121 China Weinan Central Hospital Shaanxi Xi'an714099 China
Diabetic retinopathy (DR) is a kind of ocular complication of diabetes, and its degree grade is an essential basis for early diagnosis of patients. Manual diagnosis is a long and expensive process with a specific risk... 详细信息
来源: 评论